WPA/WPA2/Remote more secure version of WPA. · WPA/WPA2 WPA

WPA/WPA2/Remote function CallWi-Fi Protected Access (WPA) and Wi-FiProtected Access II (WPA2) are two different encryption methods and security certification programs tosecure wireless computer networks.

WPA was introduced in 2003. For better802.11 wireless, the Wi-Fi Alliance introduced WPA2 in 2004, which is anupgraded and a more secure version of WPA.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

·      WPA/WPA2WPA was introduced after the Wi-Fi Alliancefound that WEP was highly vulnerable to hacker attacks. WPA is more secure thanWEP, however, WPA2 is even more secure than WPA. This is because WPA2 demandsstronger and more advanced wireless encryption than WPA does. Anotherdifference between WPA and WPA2 is the length of their passwords. WPA generallyrequires a shorter password than WPA2 does. This is another reason why WPA2 ismore secure. In WPA2, the user of the wireless network has to enter thepassword only one time, however, WPA2 has a specific layer to protect thenetwork from people who try to hack it. WPA has only one type, however, WPA2has two versions (WPA2-Personal andWPA2-Enterprise).

Generally, corporations and companies are more likely touse WPA2-Enterprise because it assigns different credentials to each wirelessuser. This decreases their risk of having an ex-employee damaging theirnetwork.Themost important changes applied on WPA include Message Integrity Check (MIC).This simply means that WPA makes sure that a hacker did not catch or modify anyof the data transmitted between users and the AP. Another important changeimplemented with WPA is the use of TKIP. Instead of having the same key for allpackets, TKIP gives a different key to each packet which enhances the securityof WPA. TKIP was later replaced by AES in WPA2.

However, WPA2 still uses TKIPas a contingency plan.             Some of WPA advantages is that it usesmore advanced encryption than the previous security protocol (WEP). Also, it usesa different way of sending keys.

WEP significantly changes the key as datapackets are sent across the network. This can be done using a Temporary Key Integrity Protocol (TKIP).However, WPA also has some disadvantages.

One of its biggest issues is that itdoes not work on old hardware and operating systems. In addition, WPA takeslong time to transmit data due to its large performance overhead.            When it comes to WPA2, it also hassome advantages and disadvantages. Some of its advantages is that it fixed thevulnerabilities that WPA and WEP had.

Some of the problems that WPA2 solved areman-in-the-middle, weak keys, and replay. Another advantage of WPA2 is that itis more secure. This is because WPA2 requires longer passwords than WPA andWEP. In addition, WPA2 uses AES encryption, which improves and increasessecurity. According to Paul Arana, a wireless technology expert, AES is used bythe U.S. government, which proves the strength of AES’s security.

Also, recentresearches show that a hacker needs to perform at least 460operations in order to break an AES key. Furthermore, there are no attackscommitted against AES so far. What makes WPA2 evenmore secure is that it uses PMK and Pre-authentication support. These two toolsimprove the roaming speed of users between wireless access points.

            As for WPA2’s disadvantages, WPA2 isvulnerable to DoS attacks such as Botnet and Ping of Death. WPA2 does notsecure management and control frames. This gives a hacker the ability to knowthe network diagram and locate the users of the network.

This also helps ahacker to commit different DoS attacks. Compared to WPA, WPA2 needs much morepower to protect your network.  In otherwords, in order for WPA2 to work perfectly, you need advanced hardware which ismore expensive than normal hardware. Without powerful hardware, you will end uphaving a poor network performance.·      Remote Function Call  Works Cited:Arena, Paul. “Benefitsand Vulnerabilities of Wi-Fi Protected Access 2 (WPA2).” George MasonUniversity,September 2006.Fitzpatrick, Jason.

“TheDifference Between WEP, WPA, and WPA2 Wi-Fi Passwords.” How-ToGeek, How-To Geek, 23 Aug. 2017.Misel, Eli. “Advantages andDisadvantages of WEP WPA Network Security.” Bright Hub, 19July2010.

Mitchell, Bradley. “Learn theDifference Between WPA2 vs. WPA for WirelessSecurity.” Lifewire,3 Dec. 2017.